EP1566009B1 - Method of generating a stream cipher using multiple keys - Google Patents
Method of generating a stream cipher using multiple keys Download PDFInfo
- Publication number
- EP1566009B1 EP1566009B1 EP03757595A EP03757595A EP1566009B1 EP 1566009 B1 EP1566009 B1 EP 1566009B1 EP 03757595 A EP03757595 A EP 03757595A EP 03757595 A EP03757595 A EP 03757595A EP 1566009 B1 EP1566009 B1 EP 1566009B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- function
- byte
- bytes
- random number
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000004590 computer program Methods 0.000 claims description 12
- 238000006467 substitution reaction Methods 0.000 claims description 8
- 238000007620 mathematical function Methods 0.000 description 2
- 241000321453 Paranthias colonus Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012886 linear function Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Definitions
- the invention relates to the field of encryption methods and more particularly to a method of generating a stream cipher to encrypt electronic communications which may be extremely long.
- OTP One-Time Pad
- a OTP takes a stream of bits that contains the plaintext message, and a secret random bit-stream of the same length as the plaintext (the key).
- OTP takes a stream of bits that contains the plaintext message, and a secret random bit-stream of the same length as the plaintext (the key).
- To encrypt the plaintext with the key each pair of bits from the key and plaintext is sequentially acted on by the exclusive-or function to obtain the ciphertext bit.
- the ciphertext cannot be deciphered if the key is truly random and the key is kept secret from an unauthorised party.
- the problem with this method is that the key should be at least the same length as the message. If a shorter key is used and repeated then the cipher can be broken. In some cases the data which needs to be encrypted is extremely large.
- US 4,058,673 discloses a method for generating a stream cipher having a length of x bits. i) A number n representing a number of sub-keys is selected. Furthermore, n unique relatively prime numbers mn each representing a unique sub-key length mn bits are selected. ii) N unique numbers are generated each having a length of mn bits. iii) A (n + 1) number R is generated. iv) For each bit which position is in said nth random number corresponds to p, where p ⁇ mn and p being a function of R, a function of each pth bit of each of said n random numbers is applied to generate a value. v) The value of p is incremented by one. vi) The steps iv) and v) are repeated and each value produced in step iv) is concatenated to the previous value produced in step iv) until the stream cipher of x bits in length has been produced.
- the present invention provides a method and a computer program product according to the appended claims.
- the invention further provides a computer program product for carrying out the method.
- Fig. 2 illustrates by way of a flowchart the method of generating the encryption key of the present invention.
- an encryption key a non-repeating stream cipher of indefinite length referred to herein as the Super Key
- the Super Key is formed by combining sub-keys. Any number n of sub keys K 1 , K 2 , ..., K n can be specified depending on the application. The greater the number of sub-keys, the greater the length of the non-repeating Super Key.
- the length of each sub key is a prime number of bytes (preferably with prime numbers larger than 10).
- the first step in the process is to determine how large a Super Key, or stream cipher, to deploy.
- the number n of sub-keys and the non-repeating length m n of each sub-key, in bytes, are selected.
- the sub-keys each have a unique non-repeating length, that is, no two sub-keys are of the same non-repeating length.
- the sub-key non-repeating lengths are prime numbers of bytes.
- the length of the subkeys, in bytes are prime numbers in the range 2, 3, 5, ..., 1021, as there are 172 different prime numbers in this range.
- the selection may be done by manually entering the number of sub- keys and their prime number non-repeating lengths.
- the number of keys and their prime number non-repeating lengths is programmed into an application, or a program randomly selects the number of sub-keys and their non-repeating length.
- the non-repeating length of the Super Key will be Size (K 1 ) X Size (K 2 ) X Size (K 3 ) ...X Size (K n ).
- 10 sub- keys of the following prime number non-repeating lengths are used:
- each of small prime number non-repeating length results in an extremely long non-repeating Super Key.
- the total definition for the size of the Super Key above is contained in 300 bytes (the sum of the lengths of the non-repeating sub-keys) and the header (number of sub-keys and their lengths). Thus the total definition for a Super Key will be a fraction of the size of the Super Key.
- each sub-key is a prime number of bytes, to improve the randomness of the resulting cipher, the method will also work if non-prime number lengths are used, as long as the resulting cipher is very large.
- this is calculated by taking the first two digits generated by a random stream, MODed by 50 and adding 50 to provide a number of keys between 50 and 99.
- Each sub-key of the multi-key process may be created as follows. First a random number which is not a perfect square is generated, preferably by a highly random source. Preferably it is an integer in the range of 500 to 700 digits. This serves as a "first seed value" O. It is verified that the selected value O is not a perfect square. If it is, then additional random values will be generated until one meets this criterion.
- the second seed value is a 32-bit value that is used to seed the rand function of the computer. Random number generators that are included in the operating systems of most computers are pseudo-random and not very robust. These values, however, are sufficient as a starting point.
- the second random number P is also generated from the computer's rand function.
- the computer discards the digits in front of the decimal and computes the number Q up to P digits after the decimal. Then, starting at the Pth digit of Q after the decimal point, the computer sequentially selects 4 digits at a time, and calculates the Mod 256 value of the 4 digits. This results in an 8-bit value. This value is used as the first byte of the sub-key.
- This process is repeated 4 digits at a time, continuing with the next digits in sequence, until a string of random data equal to the prime number non-repeating length of the sub-key being created is completed. This process is repeated for all the sub keys until the non-repeating length for all the sub keys are created. Each sub-key then is formed by taking the non-repeating string of bytes thus created, and repeating it as often as necessary to form a sub-key of sufficient length to create the Super Key in combination with the other sub-keys.
- the Super Key (cipher) is created to the length required. This means the Super Key will continue to be created to encrypt the associated data to be encrypted, and continues to be created only until all the data is encrypted.
- a random number R (“third seed value", or the starting offset for the Super Key, as opposed to the starting point P for the number Q) is generated.
- the Modm n of R is calculated and the Modm n (R)th byte of each sub-key is consecutively exclusive-or'd (X/OR'd) with the corresponding Modm n (R)th byte of every other subkey.
- the 3rd byte of sub-key 1 is selected and X
- the process is repeated until all the selected bytes from each sub-key have been X/OR'd.
- the resulting value may then be put through a substitution cipher or another delinearization function to delinearize the Super Key stream, as described further below.
- the resultant binary value is then added to the Super Key by concatenation.
- the next, subsequent byte of sub-key 1 is then X
- the resulting binary value of each function is again added to the Super Key by concatenation. While the X/OR function is preferred, it will be apparent that other functions can be applied. For example, mathematical functions of addition or subtraction can be used.
- the corresponding byte of the plaintext message is then encrypted with the corresponding byte of the Super Key by the exclusive-or function or some other mathematical function. Once all the bytes of the plaintext message have been encrypted the generation of the Super Key terminates.
- the encrypted message can then be decrypted applying the inverse of the encrypting function to it and the Super Key.
- ⁇ denotes the XOR operation.
- Rmod l ⁇ i ⁇ returns an integer in the range 0,1,2,..., ( l ⁇ i ⁇ - 1)
- the "SuperKey" has a j value that ranges from 0 to ((l ⁇ 1 ⁇ ⁇ l ⁇ 2 ⁇ ⁇ l ⁇ 3 ⁇ ... l ⁇ n ⁇ - 1).
- an L-byte Super Key is generated, and a big number counter T is used to count the number of bytes in the plaintext.
- the output is an L-byte ciphertext.
- the same big number counter T is used and the output is the L-byte plaintext.
- a further step may be applied to the Super Key before the plaintext message is encrypted.
- a substitution cipher is applied to the Super key, and the resultant string is then used to encrypt the plaintext message.
- an array of 256 unique bytes is created, from 1 to 256 ordered randomly. The first byte in the Super Key then has substituted for it the value of the x+1st byte in the Super Key, where x is the first value in the 256 byte array. The second byte in the Super Key then has substituted for it the value of the y+2nd byte in the Super Key, where y is the second value in the 256 byte array, and so on.
- the 256-byte array can be formed from one of the sub-keys, plugging in bytes from a sub-key into the array so long as they don't repeat a previous entry in the array.
- the linearity of the cipher text can be reduced also by applying the substitution cipher to the encrypted message (ciphertext) however it is more effective to apply the substitution cipher to the Super Key prior to encrypting.
- Other utilities besides a substitution cipher can be used to break linearity, such as invertible non-linear function (INLF) utilities available from SANDIA labs. These are useful to provide protection against the Berlekamp-Massey attack.
- ILF invertible non-linear function
- the method will also work if the non-repeating string of each sub-key is simply generated by a random number generator to form each sub-key, as long as the overall resultant length of the Super key is sufficiently large so that the resultant Super Key is at least double the size of the data to be encrypted.
- the foregoing method can be used to produce a personal security system whereby the key is used to encrypt personal files that the user wishes to secure. In that case no method of distribution of the key will be required.
- a new file named ⁇ OLDFILENAME ⁇ OFFSET ⁇ ⁇ wn.
- the OLDFILENAME includes the extension to allow for easy decryption and maintaining the same file format for functionality.
- As each file is encrypted it is immediately decrypted and compared to the original and then both the test copy and the original file are deleted using a clean sweep deletion process (entire file rewritten as 0's and then 1's and then deleted).
- a preferred key file format is defined as follows:
- the foregoing key file format is standard. The only different value is the offset that is stored in a string of decimal digits that are delineated by "'s. An example of this would be "98-7654321", this allows for values ranging up to 1000 digits long which prevents the reuse of sections of the key stream if the offset is implemented properly.
- the present invention is described above as a computer-implemented method, for example to encrypt and decrypt communications between computers 14 and 16 over network 12. It may also be embodied as a computer hardware apparatus, computer software code or a combination of same. The invention may also be embodied as a computer-readable storage medium embodying code for implementing the invention. Such storage medium may be magnetic or optical, hard or floppy disk, CD-ROM, firmware or other storage media. The invention may also be embodied on a computer readable modulated carrier signal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/299,847 US7190791B2 (en) | 2002-11-20 | 2002-11-20 | Method of encryption using multi-key process to create a variable-length key |
US299847 | 2002-11-20 | ||
PCT/CA2003/001538 WO2004047361A1 (en) | 2002-11-20 | 2003-10-06 | Method of generating a stream cipher using multiple keys |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1566009A1 EP1566009A1 (en) | 2005-08-24 |
EP1566009B1 true EP1566009B1 (en) | 2007-08-15 |
Family
ID=32297785
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03757595A Expired - Lifetime EP1566009B1 (en) | 2002-11-20 | 2003-10-06 | Method of generating a stream cipher using multiple keys |
Country Status (13)
Country | Link |
---|---|
US (1) | US7190791B2 (zh) |
EP (1) | EP1566009B1 (zh) |
JP (1) | JP4608319B2 (zh) |
KR (1) | KR100994841B1 (zh) |
CN (1) | CN100568802C (zh) |
AT (1) | ATE370569T1 (zh) |
AU (1) | AU2003273688B2 (zh) |
BR (2) | BRPI0316473B1 (zh) |
CA (2) | CA2414261A1 (zh) |
DE (1) | DE60315700T2 (zh) |
ES (1) | ES2291675T3 (zh) |
MX (1) | MXPA05005358A (zh) |
WO (1) | WO2004047361A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018100246A1 (en) * | 2016-11-30 | 2018-06-07 | Widlund Sam | Method and arrangement for encrypting data |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7006629B2 (en) * | 2000-12-19 | 2006-02-28 | International Business Machines Corporation | Method and system for processing a data set |
FR2838262B1 (fr) * | 2002-04-08 | 2004-07-30 | Oberthur Card Syst Sa | Procede de securisation d'une electronique a acces crypte |
CA2570340A1 (en) * | 2004-06-14 | 2005-12-29 | The University Of North Carolina At Greensboro | Systems and methods for digital content security |
CN101479984B (zh) * | 2006-04-25 | 2011-06-08 | 斯蒂芬·L.·博伦 | 用于身份管理、验证服务器、数据安全和防止中间人攻击的动态分发密钥系统和方法 |
US20080304664A1 (en) * | 2007-06-07 | 2008-12-11 | Shanmugathasan Suthaharan | System and a method for securing information |
US20100235689A1 (en) * | 2009-03-16 | 2010-09-16 | Qualcomm Incorporated | Apparatus and method for employing codes for telecommunications |
WO2012025988A1 (ja) * | 2010-08-24 | 2012-03-01 | 三菱電機株式会社 | 暗号化装置、暗号化システム、暗号化方法及び暗号化プログラム |
CN102647393B (zh) * | 2011-02-21 | 2017-02-22 | 鸿合科技有限公司 | 一种数字标牌的内容防盗播方法 |
US8767954B2 (en) * | 2011-12-01 | 2014-07-01 | Colloid, Llc | Methods and systems for deriving a cryptographic framework |
US9497185B2 (en) * | 2013-12-30 | 2016-11-15 | Google Inc. | Systems, methods, and computer program products for providing application validation |
CN106209736B (zh) * | 2015-05-04 | 2020-01-17 | 腾讯科技(深圳)有限公司 | 流媒体数据播放方法、终端及流媒体服务器 |
CN105406960B (zh) * | 2015-12-20 | 2019-02-22 | 河南思维自动化设备股份有限公司 | 一种信息加密和解密的方法 |
WO2017132693A2 (en) * | 2016-01-28 | 2017-08-03 | Tfor Llc | Removing information from data |
CN106953875A (zh) * | 2017-04-26 | 2017-07-14 | 吉林大学珠海学院 | 基于多密钥流密码的顺序加密方法 |
ZA202004225B (en) | 2019-07-11 | 2023-07-26 | Entersekt International Ltd | System and method for secure input at a remote service |
US11621837B2 (en) | 2020-09-03 | 2023-04-04 | Theon Technology Llc | Secure encryption of data using partial-key cryptography |
US11310042B2 (en) | 2020-09-11 | 2022-04-19 | Crown Sterling Limited, LLC | Methods of storing and distributing large keys |
US11552780B2 (en) * | 2020-12-23 | 2023-01-10 | Theon Technologies, Inc. | Homomorphic one-time pad encryption |
US11755772B2 (en) * | 2021-09-20 | 2023-09-12 | Crown Sterling Limited, LLC | Securing data in a blockchain with a one-time pad |
US11943336B2 (en) | 2021-11-22 | 2024-03-26 | Theon Technology Llc | Use of gradient decent function in cryptography |
US11791988B2 (en) | 2021-11-22 | 2023-10-17 | Theon Technology Llc | Use of random entropy in cryptography |
US11902420B2 (en) * | 2021-11-23 | 2024-02-13 | Theon Technology Llc | Partial cryptographic key transport using one-time pad encryption |
US20240069889A1 (en) * | 2022-08-25 | 2024-02-29 | National Technology & Engineering Solutions Of Sandia, Llc | Systems and methods for automatically updating system firmware |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3706941A (en) | 1970-10-28 | 1972-12-19 | Atomic Energy Commission | Random number generator |
US4058573A (en) * | 1971-07-02 | 1977-11-15 | Ciba-Geigy Corporation | Process for the addition of gaseous non-halogenated olefins and acetylenes to perfluoroalkyl iodides |
SE385644B (sv) | 1974-10-17 | 1976-07-12 | Ericsson Telefon Ab L M | Anordning vid kryptering och dekryptering av meddelanden |
US4375579A (en) * | 1980-01-30 | 1983-03-01 | Wisconsin Alumni Research Foundation | Database encryption and decryption circuit and method using subkeys |
US4791594A (en) | 1986-03-28 | 1988-12-13 | Technology Inc. 64 | Random-access psuedo random number generator |
JPH0769662B2 (ja) * | 1988-08-03 | 1995-07-31 | 松下電器産業株式会社 | 二元擬似乱数発生器 |
US5414771A (en) * | 1993-07-13 | 1995-05-09 | Mrj, Inc. | System and method for the creation of random sequences and for the cryptographic protection of communications |
US5454039A (en) | 1993-12-06 | 1995-09-26 | International Business Machines Corporation | Software-efficient pseudorandom function and the use thereof for encryption |
JPH08181679A (ja) | 1994-12-26 | 1996-07-12 | Nec Corp | 疑似乱数雑音発生装置 |
US5533128A (en) | 1995-01-18 | 1996-07-02 | Vobach; Arnold | Pseudo-random transposition cipher system and method |
JP3557037B2 (ja) * | 1996-04-22 | 2004-08-25 | 株式会社東芝 | 乱数生成装置及び方法、鍵系列生成装置及び方法、暗号化装置及び方法、並びに復号装置及び方法 |
AU1732597A (en) * | 1996-02-21 | 1997-09-10 | Card Call Service Co., Ltd. | Communication method using common cryptographic key |
US5666414A (en) * | 1996-03-21 | 1997-09-09 | Micali; Silvio | Guaranteed partial key-escrow |
CA2262551C (en) | 1996-08-16 | 2002-09-17 | Bell Communications Research, Inc. | Improved cryptographically secure pseudo-random bit generator for fast and secure encryption |
US6307940B1 (en) * | 1997-06-25 | 2001-10-23 | Canon Kabushiki Kaisha | Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof |
US6307936B1 (en) * | 1997-09-16 | 2001-10-23 | Safenet, Inc. | Cryptographic key management scheme |
US6345359B1 (en) | 1997-11-14 | 2002-02-05 | Raytheon Company | In-line decryption for protecting embedded software |
US6151676A (en) * | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
US6243470B1 (en) * | 1998-02-04 | 2001-06-05 | International Business Machines Corporation | Method and apparatus for advanced symmetric key block cipher with variable length key and block |
CN1240318A (zh) * | 1998-03-04 | 2000-01-05 | 朗迅科技公司 | 产生伪随机数的方法 |
US6490353B1 (en) * | 1998-11-23 | 2002-12-03 | Tan Daniel Tiong Hok | Data encrypting and decrypting apparatus and method |
US6415032B1 (en) | 1998-12-01 | 2002-07-02 | Xilinx, Inc. | Encryption technique using stream cipher and block cipher |
US20030210783A1 (en) | 2000-07-27 | 2003-11-13 | Ross Filippi | Method and system of encryption |
JP4596686B2 (ja) * | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Dpaに対して安全な暗号化 |
US20030016823A1 (en) | 2001-07-05 | 2003-01-23 | Shine Chung | Method and apparatus of using irrational numbers in random number generators for cryptography |
US7197142B2 (en) | 2001-08-24 | 2007-03-27 | Alten Alexander I | System and methods for a vernam stream cipher |
ES2296862T3 (es) * | 2001-10-19 | 2008-05-01 | Matsushita Electric Industrial Co., Ltd | Dispositivo de salida de matriz numerica, procedimiento de salida de matriz numerica, dispositivo de encriptacion y dispositivo de desencriptacion. |
-
2002
- 2002-11-20 US US10/299,847 patent/US7190791B2/en not_active Expired - Lifetime
- 2002-12-16 CA CA002414261A patent/CA2414261A1/en not_active Withdrawn
-
2003
- 2003-10-06 AT AT03757595T patent/ATE370569T1/de not_active IP Right Cessation
- 2003-10-06 DE DE60315700T patent/DE60315700T2/de not_active Expired - Lifetime
- 2003-10-06 AU AU2003273688A patent/AU2003273688B2/en not_active Ceased
- 2003-10-06 ES ES03757595T patent/ES2291675T3/es not_active Expired - Lifetime
- 2003-10-06 CN CNB2003801037554A patent/CN100568802C/zh not_active Expired - Fee Related
- 2003-10-06 CA CA2505338A patent/CA2505338C/en not_active Expired - Lifetime
- 2003-10-06 WO PCT/CA2003/001538 patent/WO2004047361A1/en active IP Right Grant
- 2003-10-06 JP JP2004552295A patent/JP4608319B2/ja not_active Expired - Fee Related
- 2003-10-06 BR BRPI0316473-0A patent/BRPI0316473B1/pt unknown
- 2003-10-06 KR KR1020057008993A patent/KR100994841B1/ko not_active IP Right Cessation
- 2003-10-06 EP EP03757595A patent/EP1566009B1/en not_active Expired - Lifetime
- 2003-10-06 BR BR0316473-0A patent/BR0316473A/pt not_active IP Right Cessation
- 2003-10-06 MX MXPA05005358A patent/MXPA05005358A/es active IP Right Grant
Non-Patent Citations (1)
Title |
---|
None * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018100246A1 (en) * | 2016-11-30 | 2018-06-07 | Widlund Sam | Method and arrangement for encrypting data |
Also Published As
Publication number | Publication date |
---|---|
AU2003273688B2 (en) | 2009-06-25 |
ES2291675T3 (es) | 2008-03-01 |
DE60315700D1 (de) | 2007-09-27 |
EP1566009A1 (en) | 2005-08-24 |
KR100994841B1 (ko) | 2010-11-16 |
CN100568802C (zh) | 2009-12-09 |
ATE370569T1 (de) | 2007-09-15 |
BR0316473A (pt) | 2005-10-11 |
CA2505338A1 (en) | 2004-06-03 |
JP4608319B2 (ja) | 2011-01-12 |
CA2505338C (en) | 2012-09-04 |
BRPI0316473B1 (pt) | 2018-03-13 |
KR20050086746A (ko) | 2005-08-30 |
MXPA05005358A (es) | 2005-08-03 |
DE60315700T2 (de) | 2008-06-05 |
CN1714531A (zh) | 2005-12-28 |
WO2004047361A1 (en) | 2004-06-03 |
US20040096056A1 (en) | 2004-05-20 |
US7190791B2 (en) | 2007-03-13 |
AU2003273688A1 (en) | 2004-06-15 |
CA2414261A1 (en) | 2004-05-20 |
JP2006506668A (ja) | 2006-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1566009B1 (en) | Method of generating a stream cipher using multiple keys | |
AU729638B2 (en) | A non-deterministic public key encryption system | |
US5751811A (en) | 32N +D bit key encryption-decryption system using chaos | |
US20020034295A1 (en) | Cryptographic method and apparatus for non-linearly merging a data block and a key | |
US20020048364A1 (en) | Parallel block encryption method and modes for data confidentiality and integrity protection | |
WO2005076521A1 (en) | Method of generating a stream cipher using multiple keys | |
US8462939B2 (en) | RNS-based cryptographic system and method | |
JP2008513811A (ja) | 計算変換の方法及びシステム | |
JP2004258667A (ja) | N個のデジットを含むワードの擬似ランダム置換の生成方法 | |
KR101506499B1 (ko) | 마스킹이 적용된 seed를 이용한 암호화 방법 | |
AU5361099A (en) | Efficient block cipher method | |
US8190892B2 (en) | Message authentication code with blind factorization and randomization | |
KR20030019365A (ko) | 메시지 인증 코드에 대한 키 정수 치환 발생 방법 및 장치 | |
JPH1117673A (ja) | 共通鍵暗号通信方法及びその通信ネットワーク | |
KR101076747B1 (ko) | 스트림 모듈의 계층적 트리 구조를 통한 무작위 접근이 가능한 암호화/복호화 방법 및 장치 | |
AU750408B2 (en) | A method of combining a serial keystream output with binary information | |
AU750323B2 (en) | A method of generating a key for a public key encryption system | |
CN116192356A (zh) | 一种基于混沌与不可约多项式的动态s盒的产生方法 | |
KR20030001888A (ko) | 키를 사용하지 않고 블록 정보만을 이용하는 암호알고리즘 설계 방법 | |
Boren et al. | Software Specifications For Tinnitus Utilizing Whitenoise (Revised Feb 2004) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050620 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60315700 Country of ref document: DE Date of ref document: 20070927 Kind code of ref document: P |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071115 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
NLV1 | Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act | ||
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: CH Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2291675 Country of ref document: ES Kind code of ref document: T3 |
|
ET | Fr: translation filed | ||
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071116 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20080115 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20071031 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071115 |
|
26N | No opposition filed |
Effective date: 20080516 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20080630 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20071008 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: RN |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: FC |
|
PGRI | Patent reinstated in contracting state [announced from national office to epo] |
Ref country code: FR Effective date: 20090128 |
|
PGRI | Patent reinstated in contracting state [announced from national office to epo] |
Ref country code: FR Effective date: 20090128 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20071006 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070815 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20080216 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 14 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20171027 Year of fee payment: 15 Ref country code: FR Payment date: 20171025 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20171027 Year of fee payment: 15 Ref country code: IT Payment date: 20171024 Year of fee payment: 15 Ref country code: ES Payment date: 20171102 Year of fee payment: 15 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60315700 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20181006 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181031 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181006 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181006 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20191129 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181007 |